Post of category Encryption

person-smartphone-office-table
Cloud · Cybersecurity Strategy · Data Security · Encryption · VPN

Cloud Security Pitfalls to Avoid

Cloud computing technology is fast becoming an attractive alternative to maintaining IT systems and applications on premise. In-house management and maintenance of IT is costly and resource-hungry....

Encryption · IT policy

IoT: Get Security Right The First Time

Let's start building security into the Internet of Things now, before everything becomes connected -- and hackable.

Encryption · Industry Commentary · SSL · VPN

Stop the Bleeding: How Enterprises Can Address the Heartbleed Bug

By now, you’ve likely heard about the recently discovered Heartbleed bug. At its simplest, this bug allows cyber criminals to exploit a flaw in technology that encrypts sensitive information, making...

Cloud · Encryption · Rethink Remote Access · virtualization · VPN

A Closer Look at Cloud VPNs

Virtual Private Networks as a Service (VPNaaS), Managed Security Service Providers (MSSP) and Cloud Remote Access are different solutions addressing the same market requirement – the ability for...

Encryption · Industry Commentary · VPN

Ransomware Looks to Blackmail Enterprises

When most people think of threats to their computer systems and networks, the usual suspects come to mind — malware and keystroke loggers that are meant to steal passwords to remotely access corporate...

Encryption · Industry Commentary · IT policy · VPN

Why Enterprises Are Struggling So Much with Encryption

Encryption. For most organizations, the need for it is very apparent, but for some reason, its implementation often falls well short of goals and expectations. The obvious question here is: why? A...

Encryption · Industry Commentary · Mobile · VPN

A Closer Look at the Android VPN Flaw

It’s been a rough couple of years for Android devices. Sure, there may have been more than 900 million of them activated in 2013 alone, but those impressive sales numbers do nothing to inhibit cyber...

Encryption · IT policy · VPN

Stopping Remote Access Breaches with “Honey”

Encryption has long been one of the most effective tools to prevent the exposure of sensitive data. As such, hackers are constantly working on new ways to crack encryption algorithms and exploit...

Encryption · Industry Commentary · VPN

Target and Neiman Marcus Hacks: The Network Security Lesson to Learn

Even if you’re not one of the tens of millions of customers that have had your credit card data stolen and sold on the black market, you’ve almost certainly heard about the Target hack that occurred...

Encryption · Industry Commentary · Rethink Remote Access · VPN

New Study Reiterates the Dangers of Advanced Persistent Threats for Network Security

When we last spoke about advanced persistent threats (APTs), the New York Times had just fallen victim to an attack that used malware to create new network patterns that allowed it to remain...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK